Title :
Locating malicious nodes for data aggregation in wireless networks
Author :
Xu, Xiaohua ; Wang, Qian ; Cao, Jiannong ; Wan, Peng-Jun ; Ren, Kui ; Chen, Yuanfang
Author_Institution :
Dept. of Comput. Sci., Illinois Inst. of Technol., Chicago, IL, USA
Abstract :
Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable security defect. Some malicious nodes may control a large percentage of the whole network data and compel the network misbehave in an arbitrary manner. Thus, locating the malicious nodes to prevent them from further disaster is a practical challenge for data aggregation schemes. Based on the grouping and localization techniques, we propose a novel integrated protocol to locate malicious nodes. The proposed protocol does not rely on any special hardware and requests only incomplete information of the network from the security schemes. We also conduct simulation study to evaluate the proposed protocol.
Keywords :
radio networks; security of data; telecommunication security; communication complexity; data aggregation; in-network aggregation; malicious nodes; primitive communication task; security scheme; unavoidable security defect; whole network data; wireless networks; Aggregates; Communication system security; Protocols; Security; Wireless networks; Wireless sensor networks;
Conference_Titel :
INFOCOM, 2012 Proceedings IEEE
Conference_Location :
Orlando, FL
Print_ISBN :
978-1-4673-0773-4
DOI :
10.1109/INFCOM.2012.6195758